Page-6 of Twitter Current Affairs, GK & News

Twitter launches #PowerOf18 campaign to boost youth engagement for 2019 polls

Twitter India has launched #PowerOf18 campaign aimed at encouraging youth to contribute in public debates and participate in civic engagement for the 2019 general elections. The initiative was launched by Twitter CEO Jack Dorsey and Maya Hari, Vice-President and Managing Director, Asia Pacific, Twitter during townhall chat with the students of IIT Delhi. #PowerOf18 campaign ..

Month: 

Category: 

Topics: 

Researchers developed a web-based tool to monitor fake news on Facebook, Twitter

A web-based tool to monitor the spread of fake news on social media platforms has been developed by the Researchers from the University of Michigan in the     US. The tool uses a Platform Health Metric called the Iffy Quotient and will supposedly draw data from two external entities namely NewsWhip and Media Bias/Fact Checker. Working ..

Month: 

Topics: 

US develops web-based tool to monitor fake news on Facebook & Twitter

The researchers at the University of Michigan in the US have developed a web-based tool to help monitor the prevalence of fake news on social media platforms like Facebook and Twitter. The tool uses a Platform Health Metric called the Iffy Quotient, which draws data from two external entities: NewsWhip and Media Bias/Fact Checker. NewsWhip, ..

Topics: 

What is the meaning of Clickjacking?

The phenomenon of the hijacking of clicks of a user on a website and thereby translating the user click on malicious content which often leads to leaking of confidential information is known as clickjacking. It can happen on any browser or any platform as it depends on the vulnerability of the user interface of the ..

Topics: 

What is Cross-site scripting?

Cross-site scripting also referred to as XSS is a security lapse in computers which allows the attackers to infuse client-side scripts into various web pages which are being seen by other users. It is responsible for about 85% of website security vulnerabilities. It is used by the attackers to surpass all kinds of access controls. ..

Topics: